WO2021257583A1 - Architecture d'ordinateur pour logiciel destiné à améliorer l'utilisation de ressources informatiques sur la base de données d'espace de travail sécurisé récupérées sur un réseau - Google Patents

Architecture d'ordinateur pour logiciel destiné à améliorer l'utilisation de ressources informatiques sur la base de données d'espace de travail sécurisé récupérées sur un réseau Download PDF

Info

Publication number
WO2021257583A1
WO2021257583A1 PCT/US2021/037455 US2021037455W WO2021257583A1 WO 2021257583 A1 WO2021257583 A1 WO 2021257583A1 US 2021037455 W US2021037455 W US 2021037455W WO 2021257583 A1 WO2021257583 A1 WO 2021257583A1
Authority
WO
WIPO (PCT)
Prior art keywords
customer
computer
customer engagement
workspace data
workspaces
Prior art date
Application number
PCT/US2021/037455
Other languages
English (en)
Inventor
Edward William GATY
Adam Mcelhinney
Original Assignee
Paylocity Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Paylocity Corporation filed Critical Paylocity Corporation
Publication of WO2021257583A1 publication Critical patent/WO2021257583A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • G06F11/3428Benchmarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0637Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
    • G06Q10/06375Prediction of business process outcome or impact based on a proposed change
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1886Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with traffic restrictions for efficiency improvement, e.g. involving subnets or subdomains
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/189Arrangements for providing special services to substations for broadcast or conference, e.g. multicast in combination with wireless systems

Definitions

  • the present disclosure generally relates to a computer architecture for software to improve computer resource utilization, and more specifically relates to improving computer resource utilization based on secure workspace data retrieved over a network.
  • Human resources service providers support customers with services in a variety of computer-based workspaces focused on categories of human resources services such as compensation, onboarding, time and labor scheduling, performance, benefits, payroll, community, expense reimbursement, learning, and employee surveys.
  • Providers increasingly rely on a broad range of technical resources to support their customers. For example, providers may offer dedicated computer-based interfaces to enable convenient, efficient, and secure interaction with customers and customer employees.
  • many of these services involve recording, processing, and preserving large volumes of customer and employee data that must be transmitted and stored securely to protect customer confidentiality and employee privacy.
  • Providers may use dedicated computers and networks to handle such data and provide services across a variety of different service workspaces.
  • the description provided in the background section should not be assumed to be prior art merely because it is mentioned in or associated with the background section.
  • the background section may include information that describes one or more aspects of the subject technology.
  • the disclosed computer-implemented methods and systems provide for improved computer resource utilization through the decryption and analysis of secure human resources data across a variety of service workspaces. This data is used to calculate a customer engagement score that may be used to track and improve customer engagement and computer resource utilization.
  • a computer-implemented method for improving computer resource utilization is provided.
  • a plurality of encrypted workspace data is received from a plurality of secure workspace data repositories associated with a plurality of human resources service workspaces.
  • the plurality of encrypted workspace data is decrypted to produce a plurality of decrypted workspace data.
  • a plurality of customer engagement metrics are calculated based on the plurality of decrypted workspace data, wherein each of the customer engagement metrics is associated with at least one of the plurality of human resources service workspaces.
  • a composite customer engagement score is calculated based on the plurality of customer engagement metrics.
  • a system for improving computer resource utilization includes a networked storage device configured to store a plurality of secure workspace data repositories associated with a plurality of human resources service workspaces, wherein the plurality of secure workspace data repositories contain a plurality of encrypted workspace data.
  • the system further includes at least one processor configured to execute computer code, which, when executed, causes the processor to retrieve the plurality of encrypted workspace data from each of a plurality of secure workspace data repositories, to decrypt the plurality of encrypted workspace data to produce a plurality of decrypted workspace data, to calculate a plurality of customer engagement metrics based on the plurality of decrypted workspace data, wherein each of the customer engagement metrics is associated with at least one of the plurality of human resources service workspaces, and to calculate a composite customer engagement score based on the plurality of customer engagement metrics.
  • a non-transitory machine- readable storage medium comprises machine-readable instructions which, when executed by at least one data processor forming part of at least one computing system, results in operations that include retrieving a plurality of encrypted workspace data from a plurality of secure workspace data repositories associated with a plurality of human resources service workspaces, decrypting the plurality of encrypted workspace data to produce a plurality of decrypted workspace data, calculating a plurality of customer engagement metrics based on the plurality of decrypted workspace data, wherein each of the customer engagement metrics is associated with at least one of the plurality of human resources service workspaces, and calculating a composite customer engagement score based on the plurality of customer engagement metrics.
  • FIG. 1 illustrates an example architecture for improving computer resource utilization.
  • FIG. 2 is a block diagram illustrating the example computer resource utilization monitoring system from and service workspace servers of the architecture of FIG. 1 according to certain aspects of the disclosure.
  • FIG. 3 illustrates an example process for improving computer resource utilization for a human resources service and technology provider maintaining a plurality of service workspaces.
  • FIG. 4 is an example illustration associated with the example processes of FIG. 3.
  • FIG. 5 illustrates another example process for improving computer resource utilization for a human resources service and technology provider maintaining a plurality of service workspaces.
  • FIG. 6 illustrates another example process for improving computer resource utilization for a human resources service and technology provider maintaining a plurality of service workspaces.
  • not all of the depicted components in each figure may be required, and one or more implementations may include additional components not shown in a figure. Variations in the arrangement and type of the components may be made without departing from the scope of the subject disclosure. Additional components, different components, or fewer components may be utilized within the scope of the subject disclosure.
  • the disclosed system provides for improved computer resource utilization and customer engagement for human resources service and technology providers based on secure workspace data retrieved over a network.
  • a human resources service and technology provider maintains a variety of workspaces to support a variety of different services, such as compensation, onboarding, time and labor scheduling, performance, benefits, payroll, community, expense reimbursement, learning, and employee surveys.
  • the human resources service and technology provider maintains a number of secure workspace data repositories that store encrypted workspace data associated with the various service workspaces. This secure data may be decrypted for analysis and improvement of computer resource utilization to improve customer engagement.
  • a computer resource utilization monitoring system may receive the decrypted workspace data and calculate a customer engagement metric for each human resources workspace based on the decrypted data.
  • the computer resource utilization monitoring system may calculate a composite customer engagement score.
  • the customer engagement score may enable the human resources service and technology provider to assess engagement with each customer and to maximize computer resource utilization across the variety of service and technology workspaces.
  • the disclosed system provides an improvement to computer functionality by allowing computer performance of a function not previously performed by a computer. Specifically, the disclosed system provides for improved utilization of computer systems maintained by a human resources service and technology provider for the benefit of its customers and their employees.
  • Extensive computer systems and supporting technology platforms are necessary to provide such human resources services, and ensuring efficient utilization of these systems across a variety of service workspaces maximizes performance of the computer systems, improves the efficiency of the services provided to customers via those computer systems, and ultimately improves the efficiency and effectiveness of the customer and its employees and business operations.
  • human resources services and technology involve data and information related to a variety of topics that are sensitive and confidential to employers and their employees, all of whom may be users of the computer systems maintained by the human resources service and technology provider.
  • Employer and employee permission may be controlled, for example, using privacy controls integrated into the disclosed system.
  • requested user information includes demographic information, then the demographic information may be aggregated on a group basis and not by individual user. Each user may be provided notice that such user information will be stored with such explicit consent.
  • the stored user information preferably may be encrypted to protect both confidentiality and security of the employers and employees.
  • FIG. 1 illustrates an example architecture 100 for improving computer resource utilization by a human resources service and technology provider and its customers.
  • the architecture 100 includes human resources service workspaces 120 dedicated to specific services provided by the human resources service and technology provider.
  • a workspace 120 provides all of the technology necessary to support particular services provided by the human resources service and technology provider.
  • the provider may maintain a workspace 120 dedicated to each of the service categories it provides, such as compensation, onboarding, time and labor scheduling, performance, benefits, payroll, community, expense reimbursement, learning, and employee surveys.
  • a separate workspace 120 may be maintained for each category of service, but multiple categories of services may be combined and supported by a common workspace 120 if desired.
  • Each human resources service workspace 120 preferably is associated with one or more networked computer servers 122 designed to support the services provided within that workspace 120. Depending on the needs of a particular human resources service and technology provider, multiple workspaces 120 may optionally share a common server 122.
  • the servers 122 can be any device having an appropriate processor, memory, and communications capability for hosting human resources services and data. Each of the servers 122 may communicate with other servers 122 within a workspace 120 as well as with the servers 122 of other workspaces 120.
  • the human resources service and technology provider, as well as its customers and their employees, may interact with the servers 122 using client devices connected to the servers 122 over a network.
  • the client devices may be desktop computers, mobile computers, tablet computers, mobile devices or any other devices having appropriate processor, memory, and communications capabilities.
  • one or more of the servers 122 can be a cloud computing server of an infrastructure-as-a-service (IaaS) and be able to support a platform-as-a- service (PaaS) and software-as-a-service (SaaS) services.
  • IaaS infrastructure-as-a-service
  • PaaS platform-as-a-service
  • SaaS software-as-a-service
  • the networks used to support communications among servers 122 and with the human resources service and technology provider and its customers and their employees within this architecture 100 may include, for example, any one or more of a personal area network (PAN), a local area network (LAN), a campus area network (CAN), a metropolitan area network (MAN), a wide area network (WAN), a broadband network (BBN), the Internet, and the like.
  • PAN personal area network
  • LAN local area network
  • CAN campus area network
  • MAN metropolitan area network
  • WAN wide area network
  • BBN broadband network
  • the network 150 can include, but is not limited to, any one or more of the following network topologies, including a bus network, a star network, a ring network, a mesh network, a star-bus network, tree or hierarchical network, and the like.
  • Each workspace 120 also preferably includes one or more secure workspace data repositories 124. Depending on the needs of a particular human resources service and technology provider, multiple workspaces 120 may optionally share a common secure workspace data repository 124.
  • the secure workspace data repositories 124 preferably store current and historical data associated with the services provided by the human resources service and technology provider within that workspace 120.
  • the secure workspace data repository 124 may store data associated with periodic compensation and bonus plans and payment for employees of a particular customer.
  • the secure workspace data repository 124 may store data associated with the process of new employees beginning work with a particular customer.
  • the secure workspace data repository 124 may store data associated with scheduling of a customer’s workforce and time recorded by the employees within that workforce.
  • the secure workspace data repository 124 may store data associated with employee performance reviews.
  • the secure workspace data repository 124 may store data associated with benefits provided to employees of a particular customer, such as health insurance and other types of non-wage benefits.
  • the secure workspace data repository 124 may store data associated with periodic wages paid to employees of a particular customer, as well as tax withholding and other related information.
  • the secure workspace data repository 124 may store data associated with social and networking groups, events, and activities supported by a particular customer for its employees.
  • the secure workspace data repository 124 may store data associated with tracking, categorizing, and reimbursing expenses incurred by employees within the performance of their employment by a particular customer.
  • the secure workspace data repository 124 may store data associated with continuing education of a customer’s employees.
  • the secure workspace data repository 124 may store data associated with surveys a particular customer conducts of its employees on a variety of topics.
  • the data preferably is both stored and communicated in encrypted form.
  • the data stored on the secure workspace data repositories 124 preferably may be stored in encrypted files or databases.
  • all communications among the service workspace servers 122 and between the service workspace servers 122 and the human resources service and technology provider, its customers, and their employees preferably may be encrypted to ensure data security. For example, such communications may be secured using end- to-end encryption.
  • the human resources services and technology provider may use the customer engagement score to enhance customer engagement and to improve the computer resource utilization of the various service workspaces 120 and their supporting technology platforms for a particular customer or across a range of customers.
  • the customer engagement score may also be calculated based in part on the results of survey data collected from customers and their employees regarding use of the various service workspaces 120 and the computer resources that support them.
  • FIG. 2 is a block diagram illustrating a computer system 200 that may be used to implement the computer resource utilization monitoring system 110 and/or the service workspace servers 122 in the architecture 100 of FIG. 1 according to certain aspects of the disclosure.
  • the computer system 200 may be implemented using hardware or a combination of software and hardware, either in a dedicated server, or integrated into another entity, or distributed across multiple entities.
  • Computer system 200 includes a bus 208 or other communication mechanism for communicating information, and a processor 202 (e.g., processor 212 and 236) coupled with bus 208 for processing information.
  • the computer system 200 can be a cloud computing server of an IaaS that is able to support PaaS and SaaS services.
  • the computer system 200 is implemented as one or more special-purpose computing devices.
  • the special-purpose computing device may be hard-wired to perform the disclosed techniques, or may include digital electronic devices such as one or more application-specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs) that are persistently programmed to perform the techniques, or may include one or more general purpose hardware processors programmed to perform the techniques pursuant to program instructions in firmware, memory, other storage, or a combination. Such special-purpose computing devices may also combine custom hard-wired logic, ASICs, or FPGAs with custom programming to accomplish the techniques.
  • the special-purpose computing devices may be desktop computer systems, portable computer systems, handheld devices, networking devices or any other device that incorporates hard-wired and/or program logic to implement the techniques.
  • the computer system 200 may be implemented with one or more processors 202.
  • Processor 202 may be a general-purpose microprocessor, a microcontroller, a Digital Signal Processor (DSP), an ASIC, a FPGA, a Programmable Logic Device (PLD), a controller, a state machine, gated logic, discrete hardware components, or any other suitable entity that can perform calculations or other manipulations of information.
  • DSP Digital Signal Processor
  • ASIC ASIC
  • FPGA field-programmable Logic Device
  • controller a state machine, gated logic, discrete hardware components, or any other suitable entity that can perform calculations or other manipulations of information.
  • Computer system 200 can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them stored in an included memory (e.g., memory 204), such as a Random Access Memory (RAM), a flash memory, a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable PROM (EPROM), registers, a hard disk, a removable disk, a CD-ROM, a DVD, or any other suitable storage device, coupled to bus 208 for storing information and instructions to be executed by processor 202.
  • code that creates an execution environment for the computer program in question e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them stored in an included memory (e.g., memory 204), such as a Random Access Memory (RAM), a
  • Expansion memory may also be provided and connected to computer system 200 through input/output module 210, which may include, for example, a SIMM (Single In Line Memory Module) card interface.
  • SIMM Single In Line Memory Module
  • expansion memory may provide extra storage space for computer system 200, or may also store applications or other information for computer system 200.
  • expansion memory may include instructions to carry out or supplement the processes described herein, and may also include secure information.
  • expansion memory may be provided as a security module for computer system 200, and may be programmed with instructions that permit secure use of computer system 200.
  • secure applications may be provided via the SIMM cards, along with additional information, such as placing identifying information on the SIMM card in a non-hackable manner.
  • the instructions may be stored in the memory 204 and implemented in one or more computer program products, e.g., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, the computer system 200, and according to any method well known to those of skill in the art, including, but not limited to, computer languages such as data-oriented languages (e.g., SQL, dBase), system languages (e.g., C, Objective-C, C++, Assembly), architectural languages (e.g., Java, .NET), and application languages (e.g., PHP, Ruby, Perl, Python).
  • data-oriented languages e.g., SQL, dBase
  • system languages e.g., C, Objective-C, C++, Assembly
  • architectural languages e.g., Java, .NET
  • application languages e.g., PHP, Ruby, Perl, Python.
  • Instructions may also be implemented in computer languages such as array languages, aspect-oriented languages, assembly languages, authoring languages, command line interface languages, compiled languages, concurrent languages, curly -bracket languages, dataflow languages, data-structured languages, declarative languages, esoteric languages, extension languages, fourth-generation languages, functional languages, interactive mode languages, interpreted languages, iterative languages, list-based languages, little languages, logic-based languages, machine languages, macro languages, metaprogramming languages, multiparadigm languages, numerical analysis, non-Engbsh-based languages, object-oriented class-based languages, object-oriented prototype- based languages, off-side rule languages, procedural languages, reflective languages, rule-based languages, scripting languages, stack-based languages, synchronous languages, syntax handling languages, visual languages, with languages, embeddable languages, and xml-based languages.
  • Memory 204 may also be used for storing temporary variable or other intermediate information during execution of instructions to be executed by processor 202.
  • a computer program as discussed herein does not necessarily correspond to a file in a file system.
  • a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, subprograms, or portions of code).
  • a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network, such as in a cloud-computing environment.
  • Computer system 200 further includes a data storage device 206 such as a magnetic disk or optical disk, coupled to bus 208 for storing information and instructions.
  • Computer system 200 may be coupled via input/output module 210 to various devices.
  • the input/output module 210 can be any input/output module.
  • Example input/output modules 210 include data ports such as USB ports.
  • input/output module 210 may be provided in communication with processor 202, so as to enable near area communication of computer system 200 with other devices.
  • the input/output module 210 may provide, for example, for wired communication in some implementations, or for wireless communication in other implementations, and multiple interfaces may also be used.
  • the input/output module 210 is configured to connect to a communications module 212.
  • Example communications modules 212 include networking interface cards, such as Ethernet cards and modems.
  • the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network.
  • communications module 212 can provide a two-way data communication coupling to a network link that is connected to a local network. Wireless links and wireless communication may also be implemented.
  • Communications module 212 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • the network link typically provides data communication through one or more local or wide area networks to other data devices.
  • the networks both use electrical, electromagnetic or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on the network link and through communications module 212, which carry the digital data to and from computer system 200, are example forms of transmission media.
  • the input/output module 210 is configured to connect to a plurality of devices, such as an input device 214 and/or an output device 216 (e.g., printer or display).
  • Example input devices 214 include a keyboard and a pointing device, e.g., a mouse or a trackball, by which a user can provide input to the computer system 200.
  • Other kinds of input devices 214 can be used to provide for interaction with a user as well, such as a tactile input device, visual input device, audio input device, or brain-computer interface device.
  • the service workspace servers 122 and the computer resource utilization monitoring system 110 can be implemented using a computer system 200 in response to processor 202 executing one or more sequences of one or more instructions contained in memory 204. Such instructions may be read into memory 204 from another machine-readable medium, such as data storage device 206. Execution of the sequences of instructions contained in main memory 204 causes processor 202 to perform the process steps described herein. One or more processors in a multi-processing arrangement may also be employed to execute the sequences of instructions contained in memory 204.
  • Processor 202 may process the executable instructions and/or data structures by remotely accessing the computer program product, for example by downloading the executable instructions and/or data structures from a remote server through communications module 212 (e.g., as in a cloud computing environment).
  • communications module 212 e.g., as in a cloud computing environment.
  • hard-wired circuitry may be used in place of or in combination with software instructions to implement various aspects of the present disclosure.
  • aspects of the present disclosure are not limited to any specific combination of hardware circuitry and software.
  • a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components.
  • a back end component e.g., as a data server
  • a middleware component e.g., an application server
  • a front end component e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components.
  • some aspects of the subject matter described in this specification may be performed on a cloud-computing environment.
  • a user of systems and methods as disclosed herein may perform at least some of the steps by accessing a cloud server through a network connection.
  • data files, circuit diagrams, performance specifications and the like resulting from the disclosure may be stored in a database server in the cloud-computing environment, or may be downloaded to a private storage device from the cloud computing environment.
  • Computing system 200 can include clients and servers.
  • a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • Computer system 200 can be, for example, and without limitation, a desktop computer, laptop computer, tablet computer, mobile telephone, or other computing device.
  • machine-readable storage medium or “computer-readable medium” as used herein refers to any medium or media that participates in providing instructions or data to processor 202 for execution.
  • storage medium refers to any non- transitory media that store data and/or instructions that cause a machine to operate in a specific fashion. Such a medium may take many forms, including, but not limited to, non-volatile media, volatile media, and transmission media.
  • Non-volatile media include, for example, optical disks, magnetic disks, or flash memory, such as data storage device 206.
  • Volatile media include dynamic memory, such as memory 204.
  • Transmission media include coaxial cables, copper wire, and fiber optics, including the wires that comprise bus 208.
  • machine-readable media include, for example, floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH EPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
  • the machine-readable storage medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more of them.
  • transmission media participates in transferring information between storage media.
  • transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 208.
  • transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
  • the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
  • display or displaying means displaying on an electronic device.
  • FIG. 3 illustrates an example process for improving computer resource utilization for a human resources service and technology provider maintaining a plurality of service workspaces 120. This process involves determining and using a composite customer engagement score based on a particular customer’s utilization of computer resources across multiple service workspaces provided by the human resources service and technology provider.
  • step 302 encrypted workspace data is retrieved from the secure workspace data repositories 124 of the service workspaces 120.
  • the encrypted workspace data may be retrieved by the service workspace servers 122.
  • step 304 the encrypted workspace data is decrypted to provide decrypted workspace data.
  • the decryption may be performed by the service workspace servers 122, by the computer resource utilization monitoring system 110, or by another computer system suitable for decryption.
  • a customer engagement metric is calculated for each service workspace 120 based on usage of the computer resources in that service workspace 120 by the customer and its employees.
  • a variety of suitable customer engagement metrics may be used depending on the nature of a particular service workspace 120.
  • the customer engagement metrics may be based on the percentage of employees who have actively used the service workspace 120 within a particular time period, such as daily, weekly, or monthly.
  • the metric may be based on the percentage of employees to whom the customer has assigned a compensation plan within the workspace 120.
  • the metric may be based on the percentage of new employees hired using the computer-based procedures available in the onboarding workspace 120.
  • the metric may be based on the percentage of employees using the scheduling workspace 120 or the percentage of employee hours tracked in the workspace 120.
  • the metric may be based on the number of employees for whom the performance workspace 120 has been used to track reviews and report employee performance.
  • the metric may be based on the percentage of eligible employees enrolled in benefits programs using the benefits workspace 120.
  • the metric may be based on the percentage of employees who have accessed paychecks or other payroll data electronically using the payroll workspace 120.
  • the metric may be based on the percentage of employees who have posted, commented, or reacted to announcements using the community workspace 120.
  • the metric may be based on the percentage of employees who have submitted expense reports using the expense workspace 120.
  • the metric may be based on the percentage of employees who have completed an online continuing education course using the learning workspace 120.
  • the metric may be based on the percentage of employees participating or creating electronic surveys using the surveys workspace 120.
  • a composite customer engagement score is calculated based on the customer engagement metrics for each service workspace 120.
  • the composite customer engagement score is calculated based on a model that maximizes computer resource utilization across the various service workspaces 120.
  • the composite customer engagement score preferably may be a weighted average of the customer engagement metrics for the various service workspaces 120.
  • Other methods of calculating the composite customer engagement score based on the customer engagement metrics may be used depending on the nature of the customer engagement metrics and other considerations such as the prioritization of particular computer resources or service workspaces 120.
  • the customer and its composite customer engagement score are assigned to a customer benchmark group for comparative analysis.
  • assignment to a customer benchmark group may be based on the size of the customer company to enable comparison of customers having similar company size.
  • assignment to a customer benchmark group may be based on the number of service workspaces 120 used by the customer or the customer’s utilization of computer resources in one or more of those service workspaces 120.
  • the assignment to a customer benchmark group also may be based on the industry in which the customer operates. For example, the assignment may be based on the customer’s coding according to the North American Industry Classification System.
  • the customer engagement metrics and/or the composite customer engagement score is displayed to an output device, such as a printer or a computer display.
  • the customer engagement metrics and the composite customer engagement score may be displayed to the human resources service and technology provider for consideration in allocating compute resources across the various service workspaces 120, as well as for to help in planning for future investment in technology to expand computer resources and service workspace 120 capacity.
  • the customer engagement metrics and the composite customer engagement score also may be displayed to the customer to help the customer maximize its employees’ utilization of the computer resources available across the various service workspaces 120.
  • the customer engagement metrics and the composite customer engagement score may be displayed as shown in FIG. 4.
  • FIG. 5 illustrates another example process for improving computer resource utilization for a human resources service and technology provider maintaining a plurality of service workspaces 120.
  • the human resources service and technology provider preferably may use a model to calculate the composite customer engagement score in a manner that maximizes computer resource utilization across the various service workspaces 120.
  • the human resources service and technology provider may utilize model acceptance criteria to judge the effectiveness of the model.
  • model acceptance criteria are selected for consideration.
  • the selected model acceptance criteria are applied to historical data from the various service workspaces 120.
  • the model acceptance criteria may be used to calculate historical composite customer engagement scores for a number of customers across various service workspaces 120.
  • the performance of the model acceptance criteria is analyzed.
  • the historical composite customer engagement scores determined in step 504 may be compared to actual computer resource utilization and customer performance during those time periods.
  • Step 508 determines whether the model acceptance criteria performance is acceptable. If not, the model acceptance criteria is modified in step 510, and the process returns to step 504 to apply and analyze the modified model acceptance criteria. Alternative, if the model acceptance criteria is determined to be acceptable in step 508, then the model acceptance criteria is accepted in step 512.
  • FIG. 6 illustrates another example process for improving computer resource utilization for a human resources service and technology provider maintaining a plurality of service workspaces 120.
  • the human resources service and technology provider may periodically wish to review the performance of the model based on actual model performance data and/or feedback from customers.
  • Such model performance data and customer feedback are collected in step 602.
  • the historical model performance is analyzed and a determination of whether the model performance is acceptable is made in step 606. If the human resources service and technology provider determines that the historical model performance is not acceptable, then the model is modified in step 608. Alternatively, if the historical model performance is acceptable, then the human resources service and technology provider maintains the current composite customer engagement scoring model in step 610.
  • phrases such as an aspect, the aspect, another aspect, some aspects, one or more aspects, an implementation, the implementation, another implementation, some implementations, one or more implementations, an embodiment, the embodiment, another embodiment, some embodiments, one or more embodiments, a configuration, the configuration, another configuration, some configurations, one or more configurations, the subject technology, the disclosure, the present disclosure, other variations thereof and alike are for convenience and do not imply that a disclosure relating to such phrase(s) is essential to the subject technology or that such disclosure applies to all configurations of the subject technology.
  • a disclosure relating to such phrase(s) may apply to all configurations, or one or more configurations.
  • a disclosure relating to such phrase(s) may provide one or more examples.
  • a phrase such as an aspect or some aspects may refer to one or more aspects and vice versa, and this applies similarly to other foregoing phrases.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Tourism & Hospitality (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Educational Administration (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne des procédés pour améliorer l'utilisation de ressources informatiques sur la base d'une analyse mise en œuvre par ordinateur de données d'espace de travail sécurisé récupérées par le biais d'une connexion au réseau. Selon un aspect, une pluralité de données d'espace de travail cryptées sont récupérées à partir d'une pluralité de référentiels de données d'espace de travail sécurisé associés à une pluralité d'espaces de travail de service de ressources humaines. La pluralité de données d'espace de travail cryptées sont décryptées pour produire une pluralité de données d'espace de travail décryptées. Une pluralité d'indices de mesure d'engagement de client sont calculées sur la base de la pluralité de données d'espace de travail décryptées, chacun indices de mesure d'engagement de client étant associé à au moins l'un de la pluralité d'espaces de travail de service de ressources humaines. Un score d'engagement de client composite est calculé sur la base de la pluralité d'indices de mesure d'engagement de client. L'invention concerne également des systèmes et des supports lisibles par machine.
PCT/US2021/037455 2020-06-17 2021-06-15 Architecture d'ordinateur pour logiciel destiné à améliorer l'utilisation de ressources informatiques sur la base de données d'espace de travail sécurisé récupérées sur un réseau WO2021257583A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/904,433 2020-06-17
US16/904,433 US20210398081A1 (en) 2020-06-17 2020-06-17 Computer architecture for software to improve computer resource utilization based on secure workspace data retrieved over a network

Publications (1)

Publication Number Publication Date
WO2021257583A1 true WO2021257583A1 (fr) 2021-12-23

Family

ID=79023776

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2021/037455 WO2021257583A1 (fr) 2020-06-17 2021-06-15 Architecture d'ordinateur pour logiciel destiné à améliorer l'utilisation de ressources informatiques sur la base de données d'espace de travail sécurisé récupérées sur un réseau

Country Status (2)

Country Link
US (1) US20210398081A1 (fr)
WO (1) WO2021257583A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180322429A1 (en) * 2017-05-05 2018-11-08 Servicenow, Inc. Graphical User Interface for Discovering Consumption of Services
US20190156358A1 (en) * 2013-02-01 2019-05-23 Hundredx, Inc. Graphical user interfaces for adaptive feedback
US20200005157A1 (en) * 2018-02-20 2020-01-02 Pearson Education, Inc. Real time development of auto scoring essay models for custom created prompts

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190156358A1 (en) * 2013-02-01 2019-05-23 Hundredx, Inc. Graphical user interfaces for adaptive feedback
US20180322429A1 (en) * 2017-05-05 2018-11-08 Servicenow, Inc. Graphical User Interface for Discovering Consumption of Services
US20200005157A1 (en) * 2018-02-20 2020-01-02 Pearson Education, Inc. Real time development of auto scoring essay models for custom created prompts

Also Published As

Publication number Publication date
US20210398081A1 (en) 2021-12-23

Similar Documents

Publication Publication Date Title
Attaran et al. Cloud computing technology: improving small business performance using the Internet
Dobrolyubova et al. Is Russia ready for digital transformation?
US9501778B2 (en) Delivering personalized recommendations that relate to transactions on display
US8929659B2 (en) Adaptively assessing object relevance based on dynamic user properties
US8239247B2 (en) Correlated analytics for benchmarking in community shared data
US20160358259A1 (en) Aggregating account information obtained from multiple institutions
US8719279B2 (en) System and method for assessing and ranking newsworthiness
US8762427B2 (en) Settlement house data management system
Koman et al. Possibilities of application a big data in the company innovation process
Volkodaeva et al. Trends in information and communication technologies development in context of economy digitalization
US11636554B2 (en) Determining an effect of a message on a personal brand based on future goals
US9578036B2 (en) Access revocation
Yousif et al. Web-based big data integration visualisation solutions
US20210398081A1 (en) Computer architecture for software to improve computer resource utilization based on secure workspace data retrieved over a network
US11842361B2 (en) Online behavior, survey, and social research system
Burova et al. Digital Technologies: Artificial Intelligence and Big Data in the Digitalization of the Russian Economy at the Present Stage
US11514118B2 (en) Managing digital events, affinities, digital queries, and private digital clip notes across client devices for an affinity networking system
US10970347B2 (en) Managing user activity context using an activity context graph
Vinay et al. Integrating TOPSIS and AHP into GORE decision support system
US20190080269A1 (en) Data center selection for content items
US20230177354A1 (en) Measuring impact of events on affinity cluster using propensity dimensions
Bhandari et al. Encrypted IT auditing and log management on cloud computing
Filin et al. Modern technologies in accounting and tax accounting
Singh et al. An Interview with Bryan Garcia, Chief Technology Officer, FinLocker, USA Leading FinTech with Cloud and Artificial Intelligence
US20230222416A1 (en) System and method for implementing a home lending data reservoir

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21825715

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21825715

Country of ref document: EP

Kind code of ref document: A1